|Course Name||Mastering Metasploit on Kali Linux|
Metasploit is one of the most widely used penetration testing framework used from corporate to law enforcement agencies. It comprises over 1500+ modules that deliver functionalities covering every phase of a penetration test.
This Course is divided into seven different phases, which are as follows:
Pre-engagement interactions: This step defines all the pre-engagement activities and scope definitions, basically everything you need to discuss with the client before the testing starts.
Intelligence gathering: This phase is all about collecting information about the target under test, by connecting to the target directly or passively, without connecting to the target at all.
Threat modeling: This phase involves matching the information uncovered to the assets to find the areas with the highest threat level.
Vulnerability analysis: This involves finding and identifying known and unknown vulnerabilities and validating them.
Exploitation: This phase works on taking advantage of the vulnerabilities discovered in the previous phase. This typically means that we are trying to gain access to the target.
Post-exploitation: The actual tasks to perform at the target, which involves downloading a file, shutting a system down, creating a new user account on the target, and so on, are parts of this phase. This phrase describes what you need to do after exploitation.
Reporting: This phase includes summing up the results of the test in a file and the possible suggestions and recommendations to fix the current weaknesses in the target.
28 Lectures and 4 Hours
Full lifetime access
Access on mobile and TV
Certificate of Completion
97 students enrolled
Gautam Kumawat is a Passionate, Security Enthusiast, Cyber Crime Investigator, Digital Forensics Expert, Professional Hacker, Security Researcher, and Law Enforcement Agencies Trainer. I am also working part-time for Rajasthan Police (Cyber Crime Cell).